CVE-2024-47832

CRITICAL

SSOReady <7f92a06 - XML Signature Bypass

Title source: llm
STIX 2.1

Description

ssoready is a single sign on provider implemented via docker. Affected versions are vulnerable to XML signature bypass attacks. An attacker can carry out signature bypass if you have access to certain IDP-signed messages. The underlying mechanism exploits differential behavior between XML parsers. Users of https://ssoready.com, the public hosted instance of SSOReady, are unaffected. We advise folks who self-host SSOReady to upgrade to 7f92a06 or later. Do so by updating your SSOReady Docker images from sha-... to sha-7f92a06. There are no known workarounds for this vulnerability.

Scores

CVSS v3 9.8
EPSS 0.0011
EPSS Percentile 28.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

CWE
CWE-347
Status published
Products (2)
ssoready/ssoready < 2024-10-09
ssoready/ssoready 0 - 0.0.0-20241009153838-7f92a0630439Go
Published Oct 09, 2024
Tracked Since Feb 18, 2026